TrustMAS: Trusted Communication Platform for Multi-Agent Systems

  • Krzysztof Szczypiorski
  • Igor Margasiński
  • Wojciech Mazurczyk
  • Krzysztof Cabaj
  • Paweł Radziszewski
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5332)


The paper presents TrustMAS – Trusted Communication Platform for Multi-Agent Systems, which provides trust and anonymity for mobile agents. The platform includes anonymous technique based on random-walk algorithm for providing general purpose anonymous communication for agents. All agents, which take part in the proposed platform, benefit from trust and anonymity that is provided for their interactions. Moreover, in TrustMAS there are StegAgents (SA) that are able to perform various steganographic communication. To achieve that goal, SAs may use methods in different layers of TCP/IP model or specialized middleware enabling steganography that allows hidden communication through all layers of mentioned model. In TrustMAS steganographic channels are used to exchange routing tables between StegAgents. Thus all StegAgents in TrustMAS with their ability to exchange information by using hidden channels form distributed steganographic router (Steg-router).


multi agents systems information hiding steganography 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
  2. 2.
    Blaze, M., Feigenbaum, J., Keromytis, A.: KeyNote: Trust Management for Public-Key Infrastructures. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 59–63. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  3. 3.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. of: IEEE 17th Symposium on Research in Security and Privacy, pp. 164–173 (1996)Google Scholar
  4. 4.
    Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)CrossRefGoogle Scholar
  5. 5.
    Damiani, E., Vimercati, D., Paraboschi, S., Samarati, P., Violante, F.: A Reputation-based Approach for Choosing Reliable Resources in Peer-to-peer Networks. In: Proc. of: The 9th ACM Conference on Computer and Communications Security CCS 2002, pp. 207–216. ACM Press, Washington (2002)Google Scholar
  6. 6.
    Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: Proc. of the IEEE Symposium on Security and Privacy (2003)Google Scholar
  7. 7.
    Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards Measuring Anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54–68. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    Dingledine, R., Mathewson, D., Syverson, P.: Tor: The Second Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (2004)Google Scholar
  9. 9.
    Doyle, P.: Believability through Context: Using Knowledge in the World to Create Intelligent Characters. In: Proc. of: the International Joint Conference on Autonomous Agents and Multi-Agent Systems (2002)Google Scholar
  10. 10.
    Handel, T., Sandford, M.: Hiding Data in the OSI Network Model. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 23–38. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  11. 11.
  12. 12.
  13. 13.
    Jansen, W., Karygiannis, T.: NIST Special Publication 800-19 – Mobile Agent Security (2000)Google Scholar
  14. 14.
    Lee, S., Sherwood, R., Bhattacharjee, B.: Cooperative peer groups in nice. In: Proc.: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 1272–1282. IEEE, Los Alamitos (2003)Google Scholar
  15. 15.
  16. 16.
    Margasiński, I., Pióro, M.: A Concept of an Anonymous Direct P2P Distribution Overlay System. In: Proceedings of the 22nd IEEE International Conference on Advanced Information Networking and Applications (AINA 2008), Okinawa, Japan (2008)Google Scholar
  17. 17.
    Reiter, M., Rubin, A.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security (TISSEC) 1(1), 66–92 (1998)CrossRefGoogle Scholar
  18. 18.
    Serjantov, A., Danezis, G.: Towards an Information Theoretic Metric for Anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41–53. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  19. 19.
    Shannon, C.: A Mathematical Theory of Communication. The Bell System Technical Journal 27, 379–423:623–656 (1948)MathSciNetCrossRefzbMATHGoogle Scholar
  20. 20.
    Sheng, S., Li, K.K., Chan, W., Xiangjun, Z., Xianzhong, D.: Agent-based Self-healing Protection System. IEEE Transactions 21(2), 610–618 (2006)Google Scholar
  21. 21.
    Szczypiorski, K., Margasiński, I., Mazurczyk, W.: Steganographic Routing in Multi Agent System Environment - Journal of Information Assurance and Security (JIAS). Dynamic Publishers Inc., Atlanta, GA 30362, USA 2(3), 235–243 (2007)Google Scholar
  22. 22.
    Szczypiorski, K.: HICCUPS: Hidden Communication System for Corrupted Networks. In: Proc. of the Tenth International Multi-Conference on Advanced Computer Systems ACS 2003, Międzyzdroje, Poland, pp. 31–40 (2003)Google Scholar
  23. 23.
    Weiss, G. (ed.): Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence, ch. 12, pp. 505–534. MIT Press, Cambridge (1999)Google Scholar
  24. 24.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Krzysztof Szczypiorski
    • 1
  • Igor Margasiński
    • 1
  • Wojciech Mazurczyk
    • 1
  • Krzysztof Cabaj
    • 1
  • Paweł Radziszewski
    • 1
  1. 1.Faculty of Electronics and Information TechnologyWarsaw University of TechnologyWarsawPoland

Personalised recommendations